Preview

Law & Policy Case Study

Better Essays
Open Document
Open Document
1839 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Law & Policy Case Study
Law and Policy Case Study
Bradley L. Hardman
UMUC

What does the word policy mean to you? In this study there will be a clear definition of the word and what it means to the company. After that is clearly defined, the next topics will be regulations and laws. Those three will cover legal environment and lead into a look at the impact the legal environment has on an organization. The final area to address is confidentiality, integrity, and availability of information. To begin with the definition of policy for our purposes comes in two parts. The first part is the definition of policy as it applies to the government be it federal, state, or local. From the website dictionary.com a policy is a course of action adopted and pursued by a government, ruler, political party, ect(dicionary.com, 2012). This definition is fairly strait forward and should not need any clarification. The second part of the definition is organizational policies; which are simply a specific course of action adopted for the sake of expediency, facility or other purpose. This can be just so the organization who developed the policy can achieve a goal or an objective. Policies are a necessary and critical part in any organization. They define the procedures and set of rules that employees or members are expected to abide by. Here is another definition from the SANS Institute,”A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area. For example, an "Acceptable Use" policy would cover the rules and regulations for appropriate use of the computing facilities”(sans.org, 2012). The site goes on to point out that sometimes a standard or guideline is used instead of the word policy. Now that policy is defined, the next topic will be the governing regulations and laws. Laws and



References: British Columbia. (2011). Information Security Policy. Retrieved June 23, 2011, from British Columbia Web site: http://www.cio.gov Canavan, S., & Diver, S. (2007). Information Security Policy – A Development Guide for Large and Small Companies. Retrieved June 23, 2011, from SANS Institute Web site: http://www.sans.org Danchev, D. (2003). Building and Implementing a Successful Information Security Policy. Retrieved June 23, 2011, from Windows Security Web site: http://www.windowsecurity.com/pages/security-policy.pdf U.S. Department of Health & Human Services. (n.d.). Summary of the HIPAA Security Rule. Retrieved June 24, 2011, from U.S. Department of Health & Human Services Web site: http://www.hhs.gov US Department of Interior, Indians Affairs. (2011, June 24). Regulations and Information Collection. Retrieved June 24, 2011, from US Department of Interior, Indians Affairs Web site: http://www.bia.gov Whitman, M. E., & Mattord, H. J. (2007). Legal, Ethical, and Professional Issues in Information Security. In M. E. Whitman, & H. J. Mattord, Principles of Information Security (pp. 90-94). Course Technology. Posted 6th January by Zinsou Messan U.S. Department of Health & Human Services. Retrieved from: http://www.hhs.gov/ocrprivacy/hipaa/understanding/summary/index.html

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Final Project

    • 4129 Words
    • 13 Pages

    An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment.…

    • 4129 Words
    • 13 Pages
    Better Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Syllabus Cmgt 4442

    • 1936 Words
    • 8 Pages

    Barr, J. G. (2011). The standard of good practice for information security. Faulkner Information Services.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Directional Healthcare

    • 1442 Words
    • 6 Pages

    U.S. Department of Health & Human Services. (2011). Health Information Privacy. Retrieved October 9, 2011, from HHS.GOV: http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html…

    • 1442 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Information Security Policy

    • 2658 Words
    • 11 Pages

    Information Security Policies are a very important part of a company’s protection; these policies are put in place to protect the company and well as the clients. It is important to maintain a constant watch over all security departments daily to ensure that everything is in working order. The policy below is a great way to keep track of the steps needed to protect your company and clients.…

    • 2658 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    “ A security policy should fulfill many purposes. It should: protect people and information; set the rules for expected behavior by users, system administrators, management, and security personnel; authorize security personnel to monitor, probe, and investigate; define and authorize the consequences of violation; define the company consensus baseline stance on security; help minimize risk; and help track compliance with regulations and legislation.” Hurwicz, Michael (2002, February 01).…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Policy Process

    • 1602 Words
    • 7 Pages

    In the business world or political, policy making is never an easy task. Policy making process goes through five different stages before an idea is implemented and then it is either altered or solidified to become an enacted policy. The system policy-makers use provides checks and balances that keep those in leadership roles from possessing too much control over the policy-making process. The discussion will outline the complete process of how a topic becomes a policy through the formulation, legislative, and implementation stages.…

    • 1602 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Security Policy Framework

    • 2433 Words
    • 10 Pages

    For Consumers. (n.d.). United States Department of Health and Human Services. Retrieved November 2, 2012, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/index.html…

    • 2433 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Waleski, B. (2006). The legal implications of information security: Regulatory compliance and liability. In H. Bidgoli (Ed.), Handbook of information security (Vol 1). New York, NY: John Wiley & Sons…

    • 2575 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    Solms, R., “Information Security Management: Guidelines to Management of Information Technology Security”, Information Management and Computer Security, vol. 6:5, 1998, pp.221-223.…

    • 4348 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    1.2.1 Formulating Policies: There are five principal sources for determining the content and meaning of policies.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Education

    • 1174 Words
    • 5 Pages

    Education policy refers to the collection of laws and rules that govern the operation of…

    • 1174 Words
    • 5 Pages
    Satisfactory Essays